Security

What is web scraping?

Web scraping is the process of data extraction from different websites. It is done by using a piece of code known as “scraper”. It includes sending a ‘GET’ type query and then HTML parsing of the received content. After parsing, the scraper searches for the specified data and convert it into the specified document.  The …

What is web scraping? Read More »

What is a Phishing attack?

Phishing is a social engineering attack which is an attempt to steal sensitive and personal user information with the ill intents of gaining illegal access or financial gains. The stolen information can be in the form of usernames, passwords, bank account details or credit card numbers. The attackers utilize this information in two ways: either …

What is a Phishing attack? Read More »

What is token authentication?

Via token authentication features, users can implement access control via URL parameters or HTTP request headers without having to build complex back-end systems Take mlytics platform as an example, we will check these tokens at the Web Application Firewall (WAF) before any request is relayed to an origin. If the token is not valid the request is …

What is token authentication? Read More »

What is a man-in-the-middle attack?

A man-in-the-middle attack is a method which an attacker places himself in between the two devices and intercepts or modifies the messages/communication. The attacker is also able of impersonating as either of two agents and can do unauthorized actions. The attack needs three participants: the victim, the entity/system under attack and the middleman who eavesdrops. …

What is a man-in-the-middle attack? Read More »

Mitigating a DDoS attack

The DDoS mitigation is a process of protecting the targeted network from the anticipated DDoS attack. A special purpose network equipment or an alternative cloud-based security measures are used for protecting the networks from attackers. Typically, a DDoS mitigation process consists of 4 steps: The detection of possible traffic flow anomalies that may indicate the …

Mitigating a DDoS attack Read More »

How does WAF work?

WAF usually resides in front of web servers, by placing a filtration barrier between the targeted server and the attacker. the WAF is able to protect against attacks like cross-site forgery, cross-site scripting and SQL injection in real time. Learn more about mlytics Enhanced Security feature. Working model Positive Security Model – PSM or Whitelisting only allows web …

How does WAF work? Read More »

×

Sign up


Email*
Already a customer? Log in